d:\NewProjects\MacroQuest\Release\EQCPU.pdb
Static task
static1
Behavioral task
behavioral1
Sample
21790974e021aa160dfb3ebfee9803775b2d2aa6c5f6abfea22b07af097407dc.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21790974e021aa160dfb3ebfee9803775b2d2aa6c5f6abfea22b07af097407dc.dll
Resource
win10v2004-20240426-en
General
-
Target
21790974e021aa160dfb3ebfee9803775b2d2aa6c5f6abfea22b07af097407dc
-
Size
96KB
-
MD5
647fbde283ee564e9eb88c94890a742f
-
SHA1
5ef805eb823b78b33db8c45afbce7160735ac541
-
SHA256
21790974e021aa160dfb3ebfee9803775b2d2aa6c5f6abfea22b07af097407dc
-
SHA512
39b4b7d6a4bb231a84e2e909a9ddc69db84fc13f46fedba36f5ed836fece1f9bf96763d470b6156fe8e7786b1ecda4855046d3b39f5fa10537cab30e678e8f57
-
SSDEEP
1536:Tj9D65gM7ytc2BqbehiKi9LSn5MSM+7fG7qABH00h/dZWPcntc+b1JD:VgX7y3mehNi4n5MSjfCbvkctcE1Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21790974e021aa160dfb3ebfee9803775b2d2aa6c5f6abfea22b07af097407dc
Files
-
21790974e021aa160dfb3ebfee9803775b2d2aa6c5f6abfea22b07af097407dc.dll windows:4 windows x86 arch:x86
fab371e677d30b59c329d2006ce68039
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
OutputDebugStringA
Sleep
GetModuleHandleA
CreateThread
GetModuleFileNameA
CloseHandle
GetSystemInfo
SetLastError
VirtualProtect
FlushInstructionCache
GetCurrentProcess
GetProcAddress
LoadLibraryA
VirtualQuery
GetCurrentThreadId
TlsSetValue
GetCommandLineA
GetVersionExA
RtlUnwind
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
InterlockedIncrement
TerminateProcess
ExitProcess
TlsAlloc
TlsFree
TlsGetValue
GetLastError
IsBadWritePtr
IsBadReadPtr
HeapValidate
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
SetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
LCMapStringA
LCMapStringW
FlushFileBuffers
user32
SetWindowsHookExA
CallNextHookEx
GetForegroundWindow
UnhookWindowsHookEx
Exports
Exports
InjectDisable
InjectEnable
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ